News

News Archive

  • October 16, 2006 16 Oct'06

    Cisco ramps up unified communications tools

    Cisco last week released a host of new products to enhance its suite of unified communications tools, including an IP phone that's easier for end users to accept.

  • October 15, 2006 15 Oct'06

    Microsoft caves to pressure over Vista security

    To accommodate third-party security vendors and appease antitrust regulators in Europe, Microsoft will make some final tweaks to Windows Vista.

  • October 15, 2006 15 Oct'06

    Flaw found in Toshiba wireless device driver

    Attackers could exploit a flaw in the Toshiba Bluetooth wireless device driver to cause a denial of service or launch malicious code on victims' machines.

  • October 15, 2006 15 Oct'06

    Sun goes back to its roots with Honeycomb user

    Stanford University is the first official Honeycomb customer; it will be using the programmable storage archive for its massive Google library project.

  • October 12, 2006 12 Oct'06

    Microsoft to fold security into Windows division

    The software giant said the move would make future Windows development efforts more efficient. The changes take effect after Microsoft releases Vista.

  • October 12, 2006 12 Oct'06

    What to do when your server goes down

    When a server goes down at a particular time every night without the prompt of a virus, our expert, Puneet Mehta, can tell you what the problem is and what you can do to avoid it.

  • October 12, 2006 12 Oct'06

    Sprint spin-off struggles with mainframe tape migration

    Telecom firm Embarq touched a nerve with mainframe users at StorageTek Forum -- huge tape migrations are forcing them to reconsider their historic loyalty to tape.

  • October 11, 2006 11 Oct'06

    Brief: Malicious Web site poses as Google

    A malicious Web site poses as Google's Italian site, but attempts to install malicious ActiveX controls on victim's machines and ultimately redirect them to adult content.

  • October 11, 2006 11 Oct'06

    Does Spanning Tree Protocol have an adverse effect on VoIP?

    Do you know if Spanning Tree has an adverse effect upon VoIP? If so, what is the best way to provide LAN-based switch redundancy to VoIP gateways?

  • October 11, 2006 11 Oct'06

    Briefs: VoIP management; mobile E911; and Windows 2003 support

    Qovia releases its new VoIP management system; 911 Enable made E911 mobile and Codima announced support for Windows 2003 server.

  • October 11, 2006 11 Oct'06

    Sun clarifies disk storage strategy

    Sun execs at StorageTek Forum say they plan to keep (but streamline) most of the disk storage portfolio -- but did not deny rumors about plans to sell off the 6920 array.

  • October 10, 2006 10 Oct'06

    McAfee CEO Samenuk retires in wake of options probe

    The investigation into stock option grants is complete and company president Kevin Weiss has been fired, as well.

  • October 10, 2006 10 Oct'06

    Google Code Search gives security experts a sinking feeling

    The new search tool from Google can help developers find useful code examples. But security experts worry that it also will make attackers' jobs that much easier.

  • October 09, 2006 09 Oct'06

    Banking on the future

    As the banking landscape changes and global competition takes hold, IT offers banks a way of differentiating themselves from the competition, so how do they balance innovation and imitation in this tough market sector?

  • October 09, 2006 09 Oct'06

    Isilon adds snapshots, makes play for mainstream NAS

    Users and analysts say Isilon's new snapshot features are a challenge to NetApp, but the NAS cluster specialist still has a way to go to compete in the enterprise.

  • October 09, 2006 09 Oct'06

    Midmarket IT pros have NAC for identity, access management

    Midmarket firms may not have the budgets of large companies, but IT pros can build identity and access management programs that are as effective as what the big guys have.

  • October 09, 2006 09 Oct'06

    Symantec unveils Security 2.0 initiative

    As part of Security 2.0, Symantec unveiled new products and partnerships with VeriSign and Accenture to help customers secure their databases, manage risk and fight ID theft.

  • October 04, 2006 04 Oct'06

    Tiered storage becoming tried and true

    Tiered storage matches the value of data with the performance (and expense) of storage. Ideally, tiered storage can save money, while easing the access demands to any single storage tier. While tiered storage has clearly brought storage costs and ...

  • October 04, 2006 04 Oct'06

    ISCSI gains strength from servers

    More powerful servers are helping ease some performance concerns for users considering IP SANs, but others say they still want to see more improvement.

  • October 03, 2006 03 Oct'06

    Cisco, Cognio team up on Wi-Fi interference detection

    Cisco and Cognio have partnered to troubleshoot and diagnose problems on the Wi-Fi network.

  • October 03, 2006 03 Oct'06

    3Com rolls out unified SMB switch

    3Com hit the market today with an all-in-one unified switch for SMBs.

  • October 03, 2006 03 Oct'06

    Alliance and Leicester to overhaul core systems

    Alliance & Leicester has announced plans replace many of its core banking systems with Accenture’s Alnova Financial Solutions banking platform under a three-year IT-led business transformation programme.

  • October 03, 2006 03 Oct'06

    Cisco, Cognio team up on Wi-Fi interference detection

    Cisco and Cognio have partnered to troubleshoot and diagnose problems on the Wi-Fi network.

  • October 02, 2006 02 Oct'06

    Cisco brings video to the enterprise

    With the success of YouTube and other consumer on-demand video offerings, Cisco plans to bring on-demand video to the enterprise.

  • October 02, 2006 02 Oct'06

    Cisco brings video to the enterprise

    With the success of YouTube and other consumer on-demand video offerings, Cisco plans to bring on-demand video to the enterprise.

  • October 01, 2006 01 Oct'06

    Column: The myths and realities of VoIP security

    Security is often cited as one of the primary reasons organizations have not deployed VoIP. The biggest VoIP security threat is not making headlines. Zeus Kerravala, Yankee Group analyst, cuts through the hype so network managers can maximize the ...

  • October 01, 2006 01 Oct'06

    New exploits target Microsoft's PowerPoint, IE

    Microsoft may have patched the VML flaw in Internet Explorer, but now it faces new threats against the Web browser and PowerPoint.

  • September 28, 2006 28 Sep'06

    Top tech tips from SearchStorage.com

    Check out the top tips on backup, SAN, NAS and storage management from SearchStorage.com.

  • September 27, 2006 27 Sep'06

    Users say keeping it simple means keeping one vendor

    Despite some potential benefits of heterogeneous shops, users at Storage Decisions say they find sticking with one vendor a better way to survive the storage sprawl.

  • September 26, 2006 26 Sep'06

    Voice over IP Fundamentals: Chapter 9, 'Billing and Mediation Services'

    Voice over IP Fundamentals: Chapter 9, 'Billing and Mediation Services'

  • September 26, 2006 26 Sep'06

    Stration worm targets Windows machines

    The worm uses several fake email messages, including one claiming to be a security update. Users are advised to avoid unsolicited email attachments.

  • September 26, 2006 26 Sep'06

    Burton Group: Web application firewall market maturing

    Web application firewalls have improved performance and functionality, but it still takes time, knowledge and skills to implement them, according to a recent Burton Group report.

  • September 25, 2006 25 Sep'06

    Open source router on par with Cisco, users say

    To avoid paying top dollar for Cisco routers, two users say Vyatta's Open Flexible Router is a viable alternative to the proprietary norm, with pluses and minuses, of course.

  • September 25, 2006 25 Sep'06

    ISCSI gets a boost from InfiniBand

    The InfiniBand protocol has already gained popularity in some bleeding-edge storage systems; a new spec will now standardise connection to iSCSI storage.

  • September 25, 2006 25 Sep'06

    IP telephony unites New Orleans nonprofit after Katrina

    Hurricane Katrina nearly disbanded the Catholic Charities Archdiocese of New Orleans, until the nonprofit rolled out a hosted voice solution

  • September 25, 2006 25 Sep'06

    IT pros worried about unsecured devices

    IT admins keep working to make networks secure even as more unsecured personal gadgets their way into companies.

  • September 24, 2006 24 Sep'06

    Hijacked consumer machines target the enterprise

    Attackers continue to strike gold by targeting consumers who lack the security savvy to address desktop application flaws, according to Symantec Corp. Enterprises ultimately pay the price.

  • September 24, 2006 24 Sep'06

    Cisco bulks up data center switching

    Cisco Systems Inc. today made significant announcements in its data center switching line: an 8-port, 10 GigE module; a blade switch for Fujitsu Siemens; and a Web-based script-sharing community.

  • September 24, 2006 24 Sep'06

    Apple fixes Mac Wi-Fi flaws

    Updated: Attackers could exploit flaws in Apple's wireless technology to cause a denial of service or run malicious code, resulting in the full takeover of vulnerable Mac machines.

  • September 24, 2006 24 Sep'06

    Cisco bulks up data center switching

    Cisco Systems Inc. today made significant announcements in its data center switching line: an 8-port, 10 GigE module; a blade switch for Fujitsu Siemens; and a Web-based script-sharing community.

  • September 20, 2006 20 Sep'06

    Reporter's notebook: Hidden gems of Interop

    The Interop conference in New York this week featured the usual suspects talking about their newest offerings and the industry at large.

  • September 19, 2006 19 Sep'06

    NAC, VPNs and behavior analysis in the Interop spotlight

    Security for the enterprise network was emphasised at Interop New York as vendors rolled out and upgraded NAC, VPN, network behavior analysis, and other threat protection products.